Cyber Security Insights For Executives

Business leaders and theit exective teams may see cyber security as the IT departments problem and a priority only when an intrusion occurs, but the cyber threat never stands still. It’s always evolving and criminal groups capitalise on new technologies to identify targets and launch attacks on an industrial scale. If your business has not experienced a cyber attack in the past year, you are in a shrinking minority. 
 
According to a survey carried out by  the Information Systems Security Association (ISSA) 58% of senior cyber security and business managers say that their organisation’s executive level  commitment to cyber security is “very good,” the remaining 42% say that their organisation’s executives’ dedication and buy-in to cyber security is “satisfactory, honest, or poor.” 
 
Cyber Security Topics Executives  Think Are Important  
 
Data privacy -   Data privacy topped the list at 35%, and this makes sense given regulations like GDPR and CCPA. In the past, data privacy was handled by legal teams, but with the onset and growth of regulations, CISOs have been asked to operationalise data privacy.  In other words, security teams are responsible for things like data discovery, the introduction of new data security controls, and coordination around technologies for data deletion.  GDPR also comes with the potential for hefty fines, so executives are paying close attention.  
 
Cyber attacks -  Can affect the interests of all stakeholders, disrupting a company’s operations, affecting how its employees work and inflicting brand damage that can severely jeopardise customer loyalty and trust. A breach can also impact sensitive information related to clients, contractors and suppliers. And as tighter regulations are put in place, companies may be exposed to legal liability, making cyber security a key corporate governance concern for investors.  
 
The threat of cyber attacks is so severe that the World Economic Forum in 2018 declared cyber security the top business risk in Europe, North America, and East Asia and the Pacific. 
 
Continuous cyber security training is lacking  - When asked if their current employer provides the cyber security team with the right level of training to keep up with business and IT risk, more than half (56%) of survey respondents answered “no,” suggesting that their organisations needed to provide more or significantly more training for the cyber security staff.
 
Internal relationships need work -  While many organisations consider the relationship between cyber security, business, and IT teams to be good, it seems that 20% of cyber security professionals say the relationship between cyber security and IT is fair or poor (surprising given that 78% of cyber security professionals got their start in IT) and 27% of survey respondents claim the relationship between cyber security and the business is fair or poor.  The biggest cyber security/IT relationship issue selected relates to prioritizing tasks between the two groups while the biggest cyber security/business relationship challenge is aligning goals.
 
Many businesses still believe they are below the criminals’ radar, however, the growth in cyber crime enabled by automatic vulnerability identification mean that every business is a target. 
 
It’s not the nature of a business that attracts the interest of cyber crime groups. It’s weak defences and the opportunity these present to mount a successful attack.  Your incident response plan should allow you to respond effectively to a range of scenarios, such as an internal breach, external attack, accidental data sharing and loss or theft of a physical device. 
 
Planning For Future Cyber Security Issues:  
 
  • Do you have an incident response plan in place? 
  • Who will lead the incident response team? 
  • What will happen in the first 24 hours after a breach? 
  • Have you allocated enough resources to ensure an effective response? 
  • What external partners will you use to manage elements such as forensic investigation, public relations, legal affairs and the notification process in the event of a data breach? 
Threats from outside the company are a huge concern for cybersecurity teams, but there are significant threats inside company firewalls. 
 
The very people who are closest to the data or other corporate assets can often be a weak link in a company’s cybersecurity program, particularly when they share passwords or files over unprotected networks, click on malicious hyperlinks sent from unknown email addresses, or otherwise act in ways that open up corporate networks to attack. Indeed, threats from inside the company account for about 43 percent of data breaches. 
 
Cyber security must be the concern of every single employee from the CEO down to the receptionist,  because implementing the best cyber security practice isn’t just about firewalls and encryption, it’s about changing the entire culture of your organisation. 
 
Creating a work environment which is vigilant and proactive is the only way to truly protect your business. Although there is no such thing as perfect protection, as a business leader, you have the responsibility to significantly reduce the risks.
 
ISSA:        Grant Thornton:     McKinsey:        Tech Centry:      Chief Executive:      CSO Online:       Image: Unsplash
 
You Might Also Read:
 
Five Things Management Must Know About Cyber Security:
 
 
« Hackers Fail To Contaminate Florida Water
Every Employee Should Be Considered A Target »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

KrCERT/CC

KrCERT/CC

KrCERT/CC is the National Computer Emergency Response Team in Korea.

Presidio

Presidio

Presidio is a leading North American IT solutions provider focused on Digital Infrastructure, Business Analytics, Cloud, Security & Emerging solutions.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.

IndoSec

IndoSec

IndoSec is an annual cybersecurity summit that powers an in-person gathering of cybersecurity leaders from Indonesia’s major corporations, leading businesses and key government entities.

AI EdgeLabs

AI EdgeLabs

AI EdgeLabs is a powerful and autonomous cybersecurity AI platform that helps security teams respond immediately to ongoing attacks and protect Edge/IoT infrastructures.

New Charter Technologies

New Charter Technologies

New Charter Technologies offers the best of both worlds: locally delivered IT solutions supported by a nationwide team with extensive experience.